ORPP logo

Secure Production Deployment of B2B Solutions using WebSphere Business Integration Connect. (Record no. 76217)

MARC details
000 -LEADER
fixed length control field 11227nam a22005173i 4500
001 - CONTROL NUMBER
control field EBC3306456
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729124912.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2005 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780738491189
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780738491189
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC3306456
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL3306456
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10112442
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)935397436
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5415.1263 -- .S43 2005eb
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.8/04/0285
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Redbooks, IBM.
245 10 - TITLE STATEMENT
Title Secure Production Deployment of B2B Solutions using WebSphere Business Integration Connect.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Durham :
Name of producer, publisher, distributor, manufacturer I B M,
Date of production, publication, distribution, manufacture, or copyright notice 2005.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2005.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (484 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front cover -- Contents -- Figures -- Tables -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Preparing for a B2B project -- Chapter 1. Overview -- 1.1 The business of B2B -- 1.1.1 Business requirements -- 1.2 Book layout -- 1.2.1 Part 1. Preparing for a B2B project -- 1.2.2 Part 2. Managing a B2B project -- 1.2.3 Part 3. Implementing a B2B solution -- 1.3 B2B deployment methodology overview -- Chapter 2. Introducing WebSphere Business Integration Connect -- 2.1 Features of WebSphere Business Integration Connect -- 2.2 WebSphere Business Integration Connect Architecture -- 2.2.1 Runtime components -- 2.2.2 Configuration components -- 2.2.3 Profile management -- 2.3 B2B features and standards -- 2.3.1 Transport options -- 2.3.2 Messaging protocol options -- 2.3.3 Business document formats -- 2.3.4 Security options in WebSphere Business Integration Connect -- 2.4 Integration options -- Chapter 3. Aspects of security -- 3.1 Overview -- 3.2 Areas of B2B security -- 3.2.1 Deployment security -- 3.2.2 Connection security -- 3.2.3 Document security -- 3.2.4 Access control -- 3.3 Security technologies -- 3.3.1 Reverse proxy server -- 3.3.2 Firewalls -- 3.3.3 Network Address Translation -- 3.3.4 Port Address Translation -- Chapter 4. Implementation topologies -- 4.1 Deployment overview -- 4.1.1 WebSphere Business Integration Connect components -- 4.1.2 Database -- 4.1.3 WebSphere MQ -- 4.1.4 Firewalls and Proxies -- 4.2 Distributed-Dual DMZ, Reverse Proxy with Failover -- 4.2.1 Deployment considerations -- 4.2.2 Inbound data flow -- 4.2.3 Outbound data flow -- 4.2.4 Pros -- 4.2.5 Cons -- 4.2.6 Variations of the reverse proxy scenario -- 4.3 Distributed-Single DMZ -- 4.3.1 Deployment considerations -- 4.3.2 Inbound data flow -- 4.3.3 Outbound data flow -- 4.3.4 Pros.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.3.5 Cons -- 4.3.6 Variations of the Single DMZ Scenarios -- Part 2 Managing a B2B project -- Chapter 5. Introduction to B2B projects -- 5.1 B2B deployment methodology overview -- 5.1.1 Knowledge transfer and training -- 5.1.2 Discovery -- 5.1.3 Planning -- 5.1.4 Installation -- 5.1.5 Customization -- 5.1.6 Testing -- 5.1.7 Production deployment -- 5.1.8 Partner ramping -- 5.1.9 Support -- 5.2 B2B project scenario overview -- 5.2.1 Overview of Company E -- 5.2.2 Business environment -- 5.2.3 Technical environment -- 5.2.4 Organizational challenges -- 5.2.5 New business strategy -- 5.2.6 Current projects -- Chapter 6. Project Espresso: Discovery phase -- 6.1 Company E discovery overview -- 6.1.1 Task review -- 6.2 B2B deployment assessment -- 6.2.1 Project Expresso deployment assessment agenda -- 6.2.2 Project Expresso deployment assessment presentation -- 6.3 Roles and responsibilities -- 6.4 Assessment meeting results -- 6.4.1 Business objectives -- 6.4.2 Technical environment review -- 6.4.3 Community profile -- 6.4.4 Data flow and integration -- 6.4.5 Environment, architecture and implementation discussion -- 6.5 Requirements and scope document -- Chapter 7. Project Espresso: Planning phase -- 7.1 Company E planning overview -- 7.1.1 Task review -- 7.2 Requirements and follow-up meetings -- 7.3 Project plan -- 7.4 Installation and deployment plan -- 7.4.1 Firewall configuration plan -- 7.4.2 Reverse proxy configuration plan -- 7.4.3 Load balancer configuration plan -- 7.4.4 WebSphere MQ configuration -- 7.4.5 Database loader deployment plan -- 7.4.6 Product installation deployment plan -- 7.4.7 Product configuration plan -- 7.4.8 Community manager configuration plan -- 7.4.9 Community participant configuration plan -- 7.4.10 Certificate deployment plan -- 7.5 Testing plan -- 7.6 Training plan -- 7.7 Support plan.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 7.7.1 How to discover or detect problems with transactions -- 7.7.2 How to report problems -- 7.7.3 How to resolve reported problems -- 7.7.4 How to maintain the system -- Chapter 8. Project Espresso: Testing phase -- 8.1 Testing overview -- 8.1.1 Task review -- 8.2 Test plan review -- 8.3 Execute the Test Plan -- 8.4 Performance testing -- 8.4.1 Performance concepts -- 8.4.2 Performance tuning -- 8.4.3 WebSphere Business Integration Connect sizing -- Chapter 9. Project Espresso: Production deployment phase -- 9.1 Production Deployment overview -- 9.1.1 Task review -- 9.2 Review the deployment plan -- 9.3 Create production environment -- 9.4 Verify component installation -- Chapter 10. Project Espresso: Partner ramping phase -- 10.1 Company E Partner Ramping overview -- 10.1.1 Task review -- 10.2 Trading partner review -- 10.3 Trading Partner ramping process -- 10.4 Trading Partner ramping plan -- Chapter 11. Project Espresso: Support phase -- 11.1 Company E Support overview -- 11.1.1 Task review -- 11.2 Ramping support -- 11.3 Monitoring and support best practices -- 11.3.1 Alerts -- 11.3.2 Monitoring -- 11.3.3 Debugging -- 11.3.4 JACL scripts -- 11.3.5 Console configuration -- 11.3.6 Profile configuration -- 11.3.7 Disaster recovery -- 11.3.8 Archive process -- 11.3.9 Logs -- 11.3.10 Data security -- 11.4 Support process and issue resolution -- Part 3 Implementing a B2B solution -- Chapter 12. Validating the environment -- 12.1 Create a validation checklist -- 12.2 Validate hardware and operating system -- 12.3 Validate network -- 12.4 Verifying software levels -- 12.4.1 Verifying DB2 -- 12.4.2 Verifying WebSphere MQ -- 12.4.3 Enabling DB2 stored procedures -- 12.5 Review validation results -- Chapter 13. Implementing a firewall -- 13.1 Network services and vulnerability -- 13.1.1 Minimizing security risk: Introducing the firewall.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 13.2 Introduction to firewall -- 13.3 Firewall types -- 13.4 Functional components of a firewall -- 13.4.1 Packet-filtering router -- 13.4.2 Application-level gateway -- 13.4.3 Network Address Translation -- 13.5 Firewall architecture -- 13.5.1 Packet filtering firewall -- 13.5.2 Dual-homed gateway firewall -- 13.5.3 Screened host firewall -- 13.5.4 Screened subnet firewall -- 13.6 Implementing firewalls in our B2B solution -- 13.6.1 Firewall1 -- 13.6.2 Firewall2 -- 13.6.3 Firewall3 -- 13.7 Limitations of a firewall -- Chapter 14. Implementing a proxy server -- 14.1 Overview of proxy servers -- 14.2 Reverse proxy -- 14.3 Discussing the data flow -- 14.4 Configuring the IBM HTTP server as reverse proxy -- 14.4.1 Create an administrator user ID and password -- 14.4.2 Configure the IBM HTTP server -- 14.5 Validating the reverse proxy -- 14.6 Using IBM HTTP Server V2.x as reverse proxy -- Chapter 15. Deploying the solution -- 15.1 Overview -- 15.2 Software installation -- 15.2.1 Adding user accounts on the DB2 server -- 15.2.2 Installing database schema -- 15.2.3 WebSphere MQ configuration -- 15.2.4 Installing the DB2 Client -- 15.2.5 Installing WebSphere MQ Client and JMS libraries -- 15.2.6 Installing the common share files -- 15.2.7 Adding a Windows user ID and group -- 15.2.8 Installing the Document Manager -- 15.2.9 Installing the Community Console -- 15.2.10 Installing the receiver -- 15.3 Initial server configuration -- 15.4 Hub configuration -- 15.4.1 Create targets -- 15.4.2 Create interactions -- 15.4.3 Create community manager -- 15.4.4 Create community participant -- 15.5 Community Manager configuration -- 15.5.1 Create a gateway -- 15.5.2 Provide B2B capabilities -- 15.6 Community Participant configuration -- 15.7 Configure participant connection -- Chapter 16. Implementing a load balancer -- 16.1 Load balancing overview.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 16.1.1 WebSphere Edge Server -- 16.1.2 Load balancer -- 16.2 Load balancing using Media Access Control (MAC) forwarding -- 16.2.1 How it works -- 16.2.2 Overall solution design -- 16.2.3 Load balancing deployment design -- 16.3 Install WebSphere Edge Server Network Dispatcher -- 16.4 Configure Network Dispatcher for load balancing -- 16.4.1 Start Network Dispatcher -- 16.4.2 Configure Network Dispatcher with the Dispatcher GUI -- 16.4.3 Configuring the cluster IP address on the network adapter -- 16.4.4 Aliasing the cluster address on the load-balancing servers -- 16.5 Validate the load balancing environment -- 16.6 IP session affinity -- 16.7 Access the components -- Chapter 17. Troubleshooting the deployment -- 17.1 Configuration issues for multihomed servers -- 17.2 Execution issues -- 17.2.1 System log files -- 17.2.2 Analyze traffic on your network -- 17.2.3 Reprocessing failed events and business documents -- 17.3 Performance Issues -- 17.3.1 Increase the Receiver timeout setting -- 17.3.2 Insufficient virtual memory for DB2 agents -- 17.3.3 Optimizing database query performance -- 17.3.4 Avoiding out-of-memory errors -- 17.3.5 Avoid long processing time on large, encrypted AS documents -- Chapter 18. Implementing HTTPS -- 18.1 Overview of SSL and the SSL handshake -- 18.2 SSL data flow -- 18.3 Firewall changes -- 18.3.1 Validating the firewalls -- 18.4 Configuring the IBM HTTP Server 1.3.x for SSL -- 18.4.1 Create a key store file -- 18.4.2 Generate a self-signed certificate -- 18.4.3 Configure the IBM HTTP Server for SSL -- 18.4.4 Validating the reverse proxy -- 18.5 Using IBM HTTP Server V2.x as a reverse proxy -- 18.6 Establishing trust from the proxy server to the Console -- 18.6.1 Validating the reverse proxy -- 18.7 Enforcing SSL connections to the Community Console -- 18.7.1 Validating the changes -- 18.8 SSL with Load Balancer.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 18.8.1 Configuring the Cluster IP address on the Network Adapter.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Middleware.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Client/server computing.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Redbooks, IBM
Title Secure Production Deployment of B2B Solutions using WebSphere Business Integration Connect
Place, publisher, and date of publication Durham : I B M,c2005
International Standard Book Number 9780738491189
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3306456">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3306456</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.